Skip to content

Conversation

Copy link
Contributor

Copilot AI commented Jan 30, 2026

Updates AWF (agentic-workflow-firewall) from v0.11.2 to v0.12.0 and enables the --enable-chroot flag to allow transparent host binary execution in the chroot environment.

Changes

  • Version bump: DefaultFirewallVersion v0.11.2 → v0.12.0
  • Chroot enabled: Added --enable-chroot flag to AWF invocations in all engines (Copilot, Claude, Codex)
  • Workflows recompiled: 145 workflow lock files regenerated with new version and flag

Implementation

The flag is added after --agent-image and before SSL Bump configuration:

// pkg/workflow/copilot_engine_execution.go (similar in claude_engine.go, codex_engine.go)
awfArgs = append(awfArgs, "--agent-image", "act")
copilotExecLog.Print("Using ACT agent container for GitHub Actions parity")

// Enable chroot for transparent host binary execution
awfArgs = append(awfArgs, "--enable-chroot")
copilotExecLog.Print("Enabled chroot for transparent host binary execution")

// Add SSL Bump support...

Workflows now invoke AWF with:

sudo -E awf ... --agent-image act --enable-chroot \
  -- '<command>'

Warning

Firewall rules blocked me from connecting to one or more addresses (expand for details)

I tried to connect to the following addresses, but was blocked by firewall rules:

  • https://api.github.com/repos/githubnext/gh-aw-firewall/releases
    • Triggering command: /usr/bin/curl curl -s REDACTED 64/pkg/tool/linux_amd64/vet E=3 ache/go/1.25.0/x64/src/os/user .cfg nfig/composer/vendor/bin/as --gdwarf-5 --64 -o 2691423/b154/_x001.o -I /opt/hostedtoolcache/go/1.25.0/x64/src/runtime/cgo 2691423/b248/ /usr/bin/gcc --gdwarf-5 --64 -o gcc (http block)
  • https://api.github.com/repos/githubnext/gh-aw-firewall/releases/latest
    • Triggering command: /usr/bin/curl curl -sL REDACTED x_amd64/link 2691�� /opt/hostedtoolcache/go/1.25.0/x64/src/runtime/c-errorsas .cfg bin/as --gdwarf-5 --64 -o 1b/0WpNSe2vJ7C0yedLavOf/VqtgCOVuSzHpA9UNech8 2691�� ache/go/1.25.0/x64/src/net -I s --gdwarf-5 --64 -o 2691423/b248/_x0--jq (http block)
    • Triggering command: /usr/bin/curl curl -sL REDACTED 64/pkg/tool/linux_amd64/vet (http block)

If you need me to access, download, or install something from one of these locations, you can either:

Original prompt

Update awf (agentic-workflow-firewall) to the latest version and enable the --enable-chroot feature. This will allow transparent host binary execution in the chroot environment.


✨ Let Copilot coding agent set things up for you — coding agent works faster and does higher quality work when set up for your repo.

Copilot AI and others added 2 commits January 30, 2026 20:31
- Update DefaultFirewallVersion to v0.12.0
- Add --enable-chroot flag to all engine AWF commands
- Update version test expectations

Co-authored-by: Mossaka <5447827+Mossaka@users.noreply.github.com>
Co-authored-by: Mossaka <5447827+Mossaka@users.noreply.github.com>
Copilot AI changed the title [WIP] Update awf to latest version and enable chroot feature Update AWF to v0.12.0 and enable chroot for transparent host binary execution Jan 30, 2026
@Mossaka Mossaka closed this Jan 30, 2026
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants